| | Why is unauthenticated encryption insecure? (cybergibbons.com) |
|
2 points by fanf2 40 days ago | past
|
| | Why What3Words is not suitable for safety critical applications (cybergibbons.com) |
|
63 points by oftenwrong on May 6, 2021 | past | 35 comments
|
| | Why What3Words is not suitable for safety critical applications (cybergibbons.com) |
|
3 points by oftenwrong on May 3, 2021 | past | 3 comments
|
| | What3Words – The Algorithm (cybergibbons.com) |
|
305 points by ykat7 on May 2, 2021 | past | 176 comments
|
| | Why What3Words is not suitable for safety critical applications (cybergibbons.com) |
|
2 points by DyslexicAtheist on April 30, 2021 | past
|
| | Why What3Words is not suitable for safety critical applications (cybergibbons.com) |
|
7 points by leafy-suburb on April 29, 2021 | past
|
| | A Warning to Users of NurseryCam (cybergibbons.com) |
|
167 points by carwyn on Feb 14, 2021 | past | 72 comments
|
| | Reading and writing firmware on an STM32 using the serial bootloader (cybergibbons.com) |
|
1 point by todsacerdoti on Nov 5, 2020 | past
|
| | Why is unauthenticated encryption insecure? (cybergibbons.com) |
|
63 points by todsacerdoti on Sept 20, 2020 | past | 38 comments
|
| | BC Vault – is their security model better? (cybergibbons.com) |
|
2 points by agent_random on Feb 2, 2020 | past
|
| | Eternal Vigilance Is the Price of Liberty (cybergibbons.com) |
|
17 points by DyslexicAtheist on June 30, 2019 | past | 1 comment
|
| | The Bitfi hardware wallet isn’t “unhackable” (cybergibbons.com) |
|
2 points by DyslexicAtheist on July 29, 2018 | past | 1 comment
|
| | CSL Dualcom CS2300-R signalling unit vulnerabilities (cybergibbons.com) |
|
6 points by GeorgeHahn on Nov 28, 2015 | past
|
| | Another example of why you shouldn't roll-your-own crypto (cybergibbons.com) |
|
12 points by cybergibbons on Nov 27, 2015 | past | 1 comment
|
| | Why does the “WEMAGIN: INTERNET PRIVACY GADGET” look like snake-oil? (cybergibbons.com) |
|
1 point by cybergibbons on Nov 14, 2014 | past
|
| | Heatmiser WiFi thermostat vulnerabilities (cybergibbons.com) |
|
6 points by cybergibbons on Sept 22, 2014 | past
|
| | Reverse engineering a wireless burglar alarm, part 1 (cybergibbons.com) |
|
3 points by DanBC on Aug 15, 2013 | past
|